共 50 条
- [42] Dealerless Corporate Key Generation for Identity-Based Encryption Schemes ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 211 - 222
- [43] Remove key escrow from the Identity-Based Encryption system EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 37 - 50
- [44] A Stateful Multicast Key Distribution Protocol Based on Identity-based Encryption 2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 19 - 24
- [47] Achieving Cloud Security using Third Party Auditor, MD5 and Identity-Based Encryption 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1304 - 1309
- [48] Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting Journal of Cryptology, 2024, 37
- [50] Efficient Selective Identity-Based Encryption Without Random Oracles Journal of Cryptology, 2011, 24 : 659 - 693